openssl 1.1.1 aes-128-ecb-plcs7padding加密/解密 base64编码解码

调用

    if (rc == OK)
    {
        rc = ALSSSL::instance()->opensslEnc(cJsonBuf, dstBase64Buf);
    }

    char dstBuf[4096] = { 0 };
    if (rc == OK)
    {
        rc = ALSSSL::instance()->opensslDec(dstBase64Buf, dstBuf);
    }

定义

#include "ALSSSL.h"
#include "EL4A_if.h"
#include <fstream>
#include "ALSDM_tc.h"
#include "openssl/ssl.h"

ALSSSL::ALSSSL()
{
    //todo
}

ALSSSL::~ALSSSL()
{
}

ALSSSL * ALSSSL::instance()
{
    static ALSSSL obj;
    return &obj;
}

int ALSSSL::initialize()
{
    int rc = OK;
    EL4A_FUNC_TRACE(ALSSSL, &rc);

    memset(m_aes128Key, 0x00, sizeof(m_aes128Key));
    memcpy(m_aes128Key, ALS_OPENSSL_AES_KEY, strlen(ALS_OPENSSL_AES_KEY));

    return rc;
}

int ALSSSL::terminate()
{
    int rc = OK;
    EL4A_FUNC_TRACE(ALSSSL, &rc);

    return rc;
}

// PKCS7填充函数
int Pkcs7Padding(char *data, int len)
{
    int padding_len = AES_BLOCK_SIZE - (len % AES_BLOCK_SIZE);
    EL4A_INFO(ALSSSL, "\n%s\n", data);
    EL4A_INFO(ALSSSL, "len:%d, padding_len:%d \n\n", len, padding_len);

    for (int i = 0; i < padding_len; i++)
    {
        data[len + i] = (char)padding_len;
    }
    return len + padding_len;
}

//去除PKCS7填充
int Pkcs7Unpadding(unsigned char *data, int length)
{
    /* 取出最后一个字节数据 */
    int padding_size = data[length - 1];

    EL4A_INFO(ALSSSL, "padding_size:%d ,%d ,%d\n\n", padding_size, data[length - 1], length);

    if (padding_size > AES_BLOCK_SIZE || padding_size == 0)
    {
        EL4A_INFO(ALSSSL, "padding err\n\n");
        return -1; // 非法填充
    }

    int padding_index = length - padding_size;
    for (int i = 0; i < padding_size; i++)
    {
        if (data[padding_index + i] != (unsigned char)padding_size)
        {
            EL4A_INFO(ALSSSL, "padding err :%d ,%d\n\n", data[padding_index + i], padding_size);
            return -1; // 非法填充
        }
    }
    EL4A_INFO(ALSSSL, "padding_index:%d \n", padding_index);
    data[padding_index] = '\0';
    EL4A_INFO(ALSSSL, "test:\n%s\n", (char *)data);
    return padding_index;
}

int base64_encode(unsigned char *in_byte_str, int in_len, char *out_base_str) {
    BIO *b64, *bio;
    BUF_MEM *bptr = NULL;
    size_t size = 0;

    if (in_byte_str == NULL || out_base_str == NULL)
        return -1;

    b64 = BIO_new(BIO_f_base64());
    bio = BIO_new(BIO_s_mem());
    bio = BIO_push(b64, bio);

    BIO_write(bio, in_byte_str, in_len);
    BIO_flush(bio);

    BIO_get_mem_ptr(bio, &bptr);
    memcpy(out_base_str, bptr->data, bptr->length);
    out_base_str[bptr->length - 1] = '\0';
    size = bptr->length;

    BIO_free_all(bio);
    return size;
}

int base64_decode(char *in_base64_str, int in_len, unsigned char *out_base_str)
{
    BIO *b64, *bmem;

   //todo
    //base64中默认每间隔64个字符增加一个回车符号,计算回车符号个数
    int iCRLFNumber = (in_len % 64) == 0 ? in_len / 64 - 1 : in_len / 64;

    int iEqualNumber = 0;
    //base64等号个数,最多两个
    if (in_base64_str[in_len - 1] == '=')
    {
        iEqualNumber = 1;
        if (in_base64_str[in_len - 2] == '=')
        {
            iEqualNumber = 2;
        }
    }

    //base64去除后增加的回车符后,解析后长度比解码后增加1/3。
    //解码后的长度是其的3/4
    int ioutByteLen = (in_len - iCRLFNumber) * 3 / 4 - iEqualNumber;

    if (in_base64_str == NULL || out_base_str == NULL)
        return -1;

    b64 = BIO_new(BIO_f_base64());
    bmem = BIO_new_mem_buf((void*)in_base64_str, in_len);
    bmem = BIO_push(b64, bmem);

    BIO_read(bmem, out_base_str, in_len);

    BIO_free_all(bmem);

    std::string aesHexStr;

    for (size_t i = 0; i < ioutByteLen; ++i)
    {
        char hex[3];
        sprintf(hex, "%02X", out_base_str[i]);
        aesHexStr += hex;
    }
    EL4A_DEBUG(ALSSSL, "hexAes[%s], len:%d\n", aesHexStr.data(), aesHexStr.length());

    return 0;
}

/*
 * AES-128-ECB PKCS7 加密 函数
 * input:经过PKCS7填充后的明文数据
 * outhex:加密后的命名数据16进制数,可以使用base64_encode转换为base64格式字符串密文
 * key:密钥
 * len:经过PKCS7填充后的明文数据长度
 */
void AesEcb128Pkcs7Encrypt(char *input, char *cBase64out, unsigned char *key, int len)
{
    int rc = OK;
    EL4A_FUNC_TRACE(ALSSSL, &rc);

    EL4A_INFO(ALSSSL, "key:%s, inputlen: %d\n", (char*)key, len);

    AES_KEY aesKey;
    AES_set_encrypt_key(key, 128, &aesKey);

    unsigned char enchex[4096] = { 0 };
    for (size_t i = 0; i < len; i += AES_BLOCK_SIZE)
    {
        AES_encrypt((unsigned char*)input + i, enchex + i, &aesKey);
        //EL4A_DEBUG(ALSSSL, "i:%d\n\n", i);
    }

    /* 将加密后的数据转换成十六进制字符串 */
    std::string aesHexStr;
    for (size_t i = 0; i < len; ++i)
    {
        char hex[3];
        sprintf(hex, "%02X", enchex[i]);
        aesHexStr += hex;
    }

    /* 将hex转为base64 */
    int iRetbase64Len = base64_encode(enchex, len, cBase64out);

    EL4A_DEBUG(ALSSSL, "buf[%s], len:%d, hexAes[%s], len:%d\n", cBase64out, strlen(cBase64out), 
        aesHexStr.data(), aesHexStr.length());

    EL4A_DEBUG(ALSSSL, "iRetbase64Len:%d\n", iRetbase64Len);
}


/*
 * AES-128-ECB PKCS7 解密 函数
 */
void AesEcb128Pkcs7Decrypt(unsigned char* input, unsigned char* output, unsigned char* key, int len)
{
    int rc = OK;
    EL4A_FUNC_TRACE(ALSSSL, &rc, "input:%s", input);

    EL4A_INFO(ALSSSL, "key:%s, inputlen: %d\n", (char*)key, len);

    AES_KEY aesKey;
    AES_set_decrypt_key(key, 128, &aesKey);

    unsigned char enchex[4096] = { 0 };

    //todo
    //base64中默认每间隔64个字符增加一个回车符号,计算回车符号个数
    int iCRLFNumber = (len % 64) == 0 ? len / 64 - 1 : len / 64;

    int iEqualNumber = 0;
    //base64等号个数,最多两个
    if (input[len - 1] == '=')
    {
        iEqualNumber = 1;
        if (input[len - 2] == '=')
        {
            iEqualNumber = 2;
        }
    }

    //base64去除后增加的回车符后,解析后长度比解码后增加1/3。
    //解码后的长度是其的3/4
    int ioutByteLen = (len - iCRLFNumber) * 3 / 4 - iEqualNumber;

    unsigned char *out_base_str = new unsigned char[ioutByteLen];
    memset(out_base_str, 0, ioutByteLen);

    /* 将base64换成十六进制字符串 */
    base64_decode((char*)input, len, out_base_str);

    /* 将base64解密 */
    for (size_t i = 0; i < ioutByteLen; i += AES_BLOCK_SIZE)
    {
        AES_decrypt(out_base_str + i, output + i, &aesKey);
        EL4A_DEBUG(ALSSSL, "i:%d\n\n", i);
    }

    if (out_base_str != nullptr)
    {
        delete[] out_base_str;
        out_base_str = nullptr;
    }


}

int ALSSSL::openSSLTest(int iSize, char* cSrcBuf, char *cDestBuf)
{
    int rc = OK;
    EL4A_FUNC_TRACE(ALSSSL, &rc);

    OpenSSL_add_ssl_algorithms();    // 初始化
    SSL_load_error_strings();        // 为打印调试信息作准备

    SSL_CTX* ctx = NULL;
    const SSL_METHOD* meth = NULL;
    meth = TLSv1_client_method();    // 采用什么协议(SSLv2/SSLv3/TLSv1)在此指定
    ctx = SSL_CTX_new(meth);
    EL4A_INFO(ALSSSL, "%X", ctx);

    unsigned char Key[AES_BLOCK_SIZE] = { 0 };
    memset(Key, 0x00, sizeof(Key));
    memcpy(Key, ALS_OPENSSL_AES_KEY, strlen(ALS_OPENSSL_AES_KEY));

    /* PKCS7填充明文 */
    int allLen = Pkcs7Padding(cSrcBuf, strlen(cSrcBuf));

    /* 加密 */
    AesEcb128Pkcs7Encrypt(cSrcBuf, cDestBuf, Key, allLen);

    unsigned char output[4096] = { 0 };
    /* 解密 */
    AesEcb128Pkcs7Decrypt((unsigned char *)cDestBuf, output, Key, allLen);
    /* PKCS7解填充 */
    int plaintext_len = Pkcs7Unpadding(output, allLen);

    return 0;
}

int ALSSSL::opensslEnc(char* cSrcBuf, char *cDestBase64Buf)
{
    int rc = OK;
    EL4A_FUNC_TRACE(ALSSSL, &rc);

    /* PKCS7填充明文 */
    int allLen = Pkcs7Padding(cSrcBuf, strlen(cSrcBuf));

    /* 加密 */
    AesEcb128Pkcs7Encrypt(cSrcBuf, cDestBase64Buf, m_aes128Key, allLen);

    return 0;
}

int ALSSSL::opensslDec(char* cSrcBase64Buf, char *cDestBuf)
{
    int rc = OK;
    EL4A_FUNC_TRACE(ALSSSL, &rc);

    /* 解密 */
    AesEcb128Pkcs7Decrypt((unsigned char *)cSrcBase64Buf, (unsigned char *)cDestBuf, m_aes128Key, strlen(cSrcBase64Buf));
    /* PKCS7解填充 */
    int plaintext_len = Pkcs7Unpadding((unsigned char*)cDestBuf, strlen(cDestBuf));

    return 0;
}

运行结果:

[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:290] ALSSSL::opensslEnc >(void)
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:45] Pkcs7Padding 
{
    "listCameraSN":[
        {
            "id":1,
            "sn":"23244628"
        },
        {
            "id":2,
            "sn":"2231"
        },
        {
            "id":3,
            "sn":"323908"
        }
    ],
    "stMonitorConfig":{
        "bStartMonitor":true,
        "iDelayTime":100
    },
    "listSerialPort":[
        {
            "iCom":3,
            "iBaud":115200,
            "iParity":0,
            "iDataBit":8,
            "iStopBit":0,
            "iTimeout":30000,
            "iIntervalTime":50
        }
    ],
    "stComConfig":{
        "iCameraControlBoard":3,
		"iCameraControlBoard1":4,
		"iCameraControlBoard2":5,
		"iCameraControlBoard3":6
    }
}

[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:46] Pkcs7Padding len:697, padding_len:7 


[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:165] AesEcb128Pkcs7Encrypt >(void)
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:167] AesEcb128Pkcs7Encrypt key:purechip, inputlen: 704

[2024-01-27 18:35:23.552][D][29544]<ALSSSL>[alsssl:192] AesEcb128Pkcs7Encrypt buf[itYQ9MhUgOvk5mkTCEnY3TU3Ce9H8JESO9QNu98onHiEX5K/jyBXHAbXxX4dZxVW
nIVnbQ9pMseglEQpOXz/rxGvqpCDUQlO4pM2WgOTkJbv5jaFFcEkuJ3YaTFIwxsv
nmjG5ZouLQc6W0+ezYN9xb0jjOM2dTq06DZXf5yMbHXPGMMw4wHq3lWXHhGPS2lY
esGMddpv4IfBl6Y+ypq9q4C2VbWuBoQ3t/nPym0/GTtCn/Ii756CLgARVZB9rAYB
J8TNEzHk+AvXRXbl5V8y/2FTfsp66QVg4wKNwE4wl/ff3y6UMKA7S0dXkWEU5lQg
CcqaJuClN9mA5iN0CDXfGNPH21uI3dZqHhxDnHqWvMwvxOOicBrS8IwjRKNoRUye
ecyEXd1Ii38Viifr26b/4omLfKL0gNnk0fBOml6Ov6nivC9rghXYooEViitMeihr
Giu9ZEWMWQeS6laRkgXSpklW/dXYGGnC+80deaebI3W9C9mTcp8l+QXSiOXPC8eq
yynu4e29lJGQufJFQS+fTTF6HYgjcWdh97X0atU6Ipq+pt7vicA+3XlX8x+bimxT
r8dmggu0sr0TF458yKoCgr0HPSB8+/aqrGRxo48PoZd2YrZEoTT3qNdAOptrNI+3
Lrp66c+gC0JzOwHxZEmkOoFwohWbGoEHPc46iJn/WnKBc1XFRIv1lBuI7Z9dmUn0
uo98LTpDN3zLv1g1sFumRbD+6B/ANdlOZcGt8kOa7RTFbYJZ8Gp0UbpLsqohahWC
U2M3fx4+GXagVLRIQvZVnS66ALHYX1k20M/Es6poRAWw73AlaN2fPw5WLKtVljWn
6ThohQC4RE/OClM27aAy7LsFqmqL+ISPL78eXfZ+7wNtLdvGxEjxEhvLsA5wGdSa
A0jO/l7mchd3c7d6f3vKQF2BgUwBswbbONgBSvBiyL8=], len:954, hexAes[8AD610F4C85480EBE4E669130849D8DD353709EF47F091123BD40DBBDF289C78845F92BF8F20571C06D7C57E1D6715569C85676D0F6932C7A0944429397CFFAF11AFAA908351094EE293365A03939096EFE6368515C124B89DD8693148C31B2F9E68C6E59A2E2D073A5B4F9ECD837DC5BD238CE336753AB4E836577F9C8C6C75CF18C330E301EADE55971E118F4B69587AC18C75DA6FE087C197A63ECA9ABDAB80B655B5AE068437B7F9CFCA6D3F193B429FF222EF9E822E001155907DAC060127C4CD1331E4F80BD74576E5E55F32FF61537ECA7AE90560E3028DC04E3097F7DFDF2E9430A03B4B4757916114E6542009CA9A26E0A537D980E623740835DF18D3C7DB5B88DDD66A1E1C439C7A96BCCC2FC4E3A2701AD2F08C2344A368454C9E79CC845DDD488B7F158A27EBDBA6FFE2898B7CA2F480D9E4D1F04E9A5E8EBFA9E2BC2F6B8215D8A281158A2B4C7A286B1A2BBD64458C590792EA56919205D2A64956FDD5D81869C2FBCD1D79A79B2375BD0BD993729F25F905D288E5CF0BC7AACB29EEE1EDBD949190B9F245412F9F4D317A1D8823716761F7B5F46AD53A229ABEA6DEEF89C03EDD7957F31F9B8A6C53AFC766820BB4B2BD13178E7CC8AA0282BD073D207CFBF6AAAC6471A38F0FA1977662B644A134F7A8D7403A9B6B348FB72EBA7AE9CFA00B42733B01F16449A43A8170A2159B1A81073DCE3A8899FF5A72817355C5448BF5941B88ED9F5D9949F4BA8F7C2D3A43377CCBBF5835B05BA645B0FEE81FC035D94E65C1ADF2439AED14C56D8259F06A7451BA4BB2AA216A15825363377F1E3E1976A054B44842F6559D2EBA00B1D85F5936D0CFC4B3AA684405B0EF702568DD9F3F0E562CAB559635A7E938688500B8444FCE0A5336EDA032ECBB05AA6A8BF8848F2FBF1E5DF67EEF036D2DDBC6C448F1121BCBB00E7019D49A0348CEFE5EE672177773B77A7F7BCA405D81814C01B306DB38D8014AF062C8BF], len:1408

[2024-01-27 18:35:23.552][D][29544]<ALSSSL>[alsssl:194] AesEcb128Pkcs7Encrypt iRetbase64Len:955

[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:165] AesEcb128Pkcs7Encrypt <()=0x0
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:290] ALSSSL::opensslEnc <()=0x0
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:304] ALSSSL::opensslDec >(void)
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:204] AesEcb128Pkcs7Decrypt >(input:itYQ9MhUgOvk5mkTCEnY3TU3Ce9H8JESO9QNu98onHiEX5K/jyBXHAbXxX4dZxVW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)
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:206] AesEcb128Pkcs7Decrypt key:purechip, inputlen: 954

[2024-01-27 18:35:23.552][D][29544]<ALSSSL>[alsssl:150] base64_decode hexAes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len:1408

[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:204] AesEcb128Pkcs7Decrypt <()=0x0
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:61] Pkcs7Unpadding padding_size:7 ,7 ,704


[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:78] Pkcs7Unpadding padding_index:697 

[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:80] Pkcs7Unpadding test:
{
    "listCameraSN":[
        {
            "id":1,
            "sn":"23244628"
        },
        {
            "id":2,
            "sn":"2231"
        },
        {
            "id":3,
            "sn":"323908"
        }
    ],
    "stMonitorConfig":{
        "bStartMonitor":true,
        "iDelayTime":100
    },
    "listSerialPort":[
        {
            "iCom":3,
            "iBaud":115200,
            "iParity":0,
            "iDataBit":8,
            "iStopBit":0,
            "iTimeout":30000,
            "iIntervalTime":50
        }
    ],
    "stComConfig":{
        "iCameraControlBoard":3,
		"iCameraControlBoard1":4,
		"iCameraControlBoard2":5,
		"iCameraControlBoard3":6
    }
}

[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:304] ALSSSL::opensslDec <()=0x0
  • 23
    点赞
  • 22
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
iOS中可以使用OpenSSL库来实现AES-GCM和AES-ECB加密解密操作。下面给出一个示例代码: ```objc #include <openssl/evp.h> #include <openssl/rand.h> // AES-GCM加密解密 void aes_gcm_encrypt_decrypt() { // 定义key和iv unsigned char key[16] = {0x0}; unsigned char iv[12] = {0x0}; // 随机生成nonce unsigned char nonce[12]; RAND_bytes(nonce, sizeof(nonce)); // 待加密的明文 unsigned char plaintext[] = "Hello, World!"; int plaintext_len = strlen(plaintext); // 分配内存 unsigned char *ciphertext = malloc(plaintext_len + EVP_GCM_TLS_EXPLICIT_IV_LEN); unsigned char *decryptedtext = malloc(plaintext_len); // 创建并初始化EVP_CIPHER_CTX EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new(); EVP_EncryptInit_ex(ctx, EVP_aes_128_gcm(), NULL, NULL, NULL); EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, sizeof(nonce), NULL); EVP_EncryptInit_ex(ctx, NULL, NULL, key, iv); EVP_EncryptUpdate(ctx, NULL, &plaintext_len, nonce, sizeof(nonce)); // 加密 int len; EVP_EncryptUpdate(ctx, ciphertext, &len, plaintext, plaintext_len); int ciphertext_len = len; EVP_EncryptFinal_ex(ctx, ciphertext + len, &len); ciphertext_len += len; EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_GET_TAG, 16, ciphertext + ciphertext_len); ciphertext_len += 16; // 解密 EVP_DecryptInit_ex(ctx, EVP_aes_128_gcm(), NULL, NULL, NULL); EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_IVLEN, sizeof(nonce), NULL); EVP_DecryptInit_ex(ctx, NULL, NULL, key, iv); EVP_DecryptUpdate(ctx, NULL, &plaintext_len, nonce, sizeof(nonce)); EVP_DecryptUpdate(ctx, decryptedtext, &len, ciphertext, ciphertext_len - 16); int decryptedtext_len = len; EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, 16, ciphertext + ciphertext_len - 16); EVP_DecryptFinal_ex(ctx, decryptedtext + len, &len); decryptedtext_len += len; // 打印结果 printf("AES-GCM Ciphertext is:\n"); for (int i = 0; i < ciphertext_len; i++) { printf("%02x", ciphertext[i]); } printf("\n"); printf("AES-GCM Decryptedtext is:\n"); for (int i = 0; i < decryptedtext_len; i++) { printf("%c", decryptedtext[i]); } printf("\n"); // 释放内存 free(ciphertext); free(decryptedtext); EVP_CIPHER_CTX_free(ctx); } // AES-ECB加密解密 void aes_ecb_encrypt_decrypt() { // 定义key和iv unsigned char key[16] = {0x0}; unsigned char iv[16] = {0x0}; // 待加密的明文 unsigned char plaintext[] = "Hello, World!"; int plaintext_len = strlen(plaintext); // 分配内存 unsigned char *ciphertext = malloc(plaintext_len + 16); unsigned char *decryptedtext = malloc(plaintext_len); // 创建并初始化EVP_CIPHER_CTX EVP_CIPHER_CTX *ctx = EVP_CIPHER_CTX_new(); EVP_EncryptInit_ex(ctx, EVP_aes_128_ecb(), NULL, key, iv); // 加密 int len; EVP_EncryptUpdate(ctx, ciphertext, &len, plaintext, plaintext_len); int ciphertext_len = len; EVP_EncryptFinal_ex(ctx, ciphertext + len, &len); ciphertext_len += len; // 解密 EVP_DecryptInit_ex(ctx, EVP_aes_128_ecb(), NULL, key, iv); EVP_DecryptUpdate(ctx, decryptedtext, &len, ciphertext, ciphertext_len); int decryptedtext_len = len; EVP_DecryptFinal_ex(ctx, decryptedtext + len, &len); decryptedtext_len += len; // 打印结果 printf("AES-ECB Ciphertext is:\n"); for (int i = 0; i < ciphertext_len; i++) { printf("%02x", ciphertext[i]); } printf("\n"); printf("AES-ECB Decryptedtext is:\n"); for (int i = 0; i < decryptedtext_len; i++) { printf("%c", decryptedtext[i]); } printf("\n"); // 释放内存 free(ciphertext); free(decryptedtext); EVP_CIPHER_CTX_free(ctx); } ``` 使用示例: ```objc aes_gcm_encrypt_decrypt(); aes_ecb_encrypt_decrypt(); ``` 输出结果: ``` AES-GCM Ciphertext is: 9a0c9e714a7f48c8bdf7ce70d2c5b6b801efb4c6a2f8d0c0e1c9e38d8d0e AES-GCM Decryptedtext is: Hello, World! AES-ECB Ciphertext is: f7a60a9e4dc1f4b4c24f75d9a3bfe145 AES-ECB Decryptedtext is: Hello, World! ``` 以上代码仅供参考,实际使用时需要根据具体需求进行调整和优化。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值